[1] |
戚建国 . 基于云计算的大数据安全隐私保护的研究[D]. 北京:北京邮电大学, 2015. QI J G . Research on security privacy protection of large data based on cloud computing[D]. Beijing: Beijing University of Posts and Telecommunications, 2015.
|
[2] |
康瑛石, 郑子军 , 大数据整合机制与信息共享服务实现[J]. 电信科学, 2014,30(12): 97-102. KANG Y S , ZHENG Z J . Big data integration mechanism and information sharing service realization[J]. Telecommunications Science, 2014,30(12): 97-102.
|
[3] |
徐勇, 秦小麟, 杨一涛 , 等. 一种考虑属性权重的隐私保护数据发布方法[J]. 计算机研究与发展, 2012,49(5): 913-924. XU Y , QIN X L , YANG Y T , et al. A QI weighted-aware approach to privacy preserving publishing data set[J]. Journal of Computer Research and Development, 2012,49(5): 913-924.
|
[4] |
MACHANAVAJJHALA A , GEHRKE J , KIFER D , et al. L-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1): 24-32.
|
[5] |
李明庆 . 一种基于抽样确定泛化区间的K-匿名算法[J]. 哈尔滨:哈尔滨工程大学, 2013. LI M Q . A K-anonymity algorithm based on sampling to determine the generalized interval[D]. Harbin: Harbin Engineering University, 2013.
|
[6] |
WANG K , FUNG B C M , YU P S . Handicapping attacker's confidence: an alternative to k-anonymization[J]. Knowledge &Information Systems, 2007,11(3): 345-368.
|
[7] |
TERROVITIS M , MAMOULIS N , LIAGOURIS J , et al. Privacy preservation by disassociation[J]. Proceedings of the Vldb Endowment, 2012,5(10): 944-955.
|
[8] |
黄春梅, 费耀平, 李敏 , 等. 基于多维泛化路径的K-匿名算法[J]. 计算机工程, 2009,35(2): 154-156. HUANG C M , FEI Y P , LI M . K-anonymity algorithm based on multi-dimensional generalization path[J]. Computer Engineering, 2009,35(2): 154-156.
|
[9] |
FUNG B C M , WANG K , YU P S . Anonymizing classification data for privacy preservation[J]. IEEE Transactions on Knowledge & Data Engineering, 2007,19(5): 711-725.
|
[10] |
RAJALAKSHMI V , MALA G S A . Anonymization based on nested clustering for privacy preservation in data mining[J]. Indian Journal of Computer Science & Engineering, 2013,34(3): 856-861.
|
[11] |
MOHAMMED N , FUNG B C M , HUNG P C K , et al. Centralized and distributed anonymization for high-dimensional healthcare data[J]. ACM Transactions on Knowledge Discovery from Data, 2010,4(4): 885-900.
|
[12] |
ZHANG X , YANG L T , LIU C , et al. A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud[J]. IEEE Transactions on Parallel &Distributed Systems, 2014,25(2): 363-373.
|
[13] |
吕品, 钟珞, 于文兵 , 等. MA-Datafly:一种支持多属性泛化的k-匿名方法[J]. 计算机工程与应用, 2013,49(4): 138-140. LV P , ZHONG L , YU W B , et al. MA-Datafly: k anonymity approaches for supporting multi-attribute generalization[J]. Computer Engineering and Applications, 2013,49(4): 138-140.
|
[14] |
刘盼盼 . 基于聚类的数据匿名发布技术研究[D]. 西安:西安电子科技大学, 2013. LIU P P . Research on technology of data anonymous publishing based on clustering[D]. Xi'an: Xidian University, 2013.
|
[15] |
CUI X , ZHU P , YANG X , et al. Optimized big data K-means clustering using map reduce[J]. Journal of Super Computing, 2014,70(3): 1249-1259.
|
[16] |
王笑帝, 张云勇, 刘镝 , 等. 云计算虚拟化安全技术研究[J]. 电信科学, 2015,31(6): 1-5. WANG X D , ZHANG Y Y , LIU D , et al. Research on security of virtualization on cloud computing[J]. Telecommunications Science, 2015,31(6): 1-5.
|
[17] |
KVM[EB/OL]. (2011-04-10)[2012-02-10]. .
|